期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents 被引量:9
1
作者 RAINA Manik KUMAR Subhas PATRO Ranjeet 《自动化学报》 EI CSCD 北大核心 2006年第6期915-921,共7页
This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g... This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results. 展开更多
关键词 Wireless sensor networks mobile agents
下载PDF
基于Multi-Mobile Agent的决策模型在电子政务中的应用 被引量:1
2
作者 郭荷清 吴涛 《计算机应用与软件》 CSCD 北大核心 2007年第11期109-110,146,共3页
电子政务是"信息高速公路"的首要应用领域,各国政府信息化的首要目标就是建立电子政府,推行电子政务。基于Multi-Agent和Mobile-Agent的电子政务协同决策方法,是利用Agent内部的知识库和推理规则进行智能决策,通过资源测评体... 电子政务是"信息高速公路"的首要应用领域,各国政府信息化的首要目标就是建立电子政府,推行电子政务。基于Multi-Agent和Mobile-Agent的电子政务协同决策方法,是利用Agent内部的知识库和推理规则进行智能决策,通过资源测评体系进行硬性挑选,从一定程度上减少了弄虚作假的可能,保证了政府部门以开放的机制进行人事决策,更有利于用客观和科学的准则来保证决策的公平公正性。 展开更多
关键词 MULTI—agent mobileagent 电子政务 协同决策
下载PDF
Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:1
3
作者 Weijin Jiang Yang Wang +4 位作者 Yirong Jiang Yuhui Xu Jiahui Chen Lina Tan Guo Liang 《Computers, Materials & Continua》 SCIE EI 2020年第1期123-136,共14页
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management... In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness. 展开更多
关键词 Cloud computing mobile agent system subjective trust objective trust dynamic trust management mobile Internet
下载PDF
Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent
4
作者 Weijin Jiang Wei Liu +3 位作者 Haolong Xia Yuhui Xu Dongbo Cao Guo Liang 《Computers, Materials & Continua》 SCIE EI 2020年第12期2543-2555,共13页
In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,person... In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment. 展开更多
关键词 mobile Internet mobile commerce dynamic trust model reputation management mobile agent System(MAS)
下载PDF
Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts
5
作者 Tarig Mohamed Ahmed 《Computers, Materials & Continua》 SCIE EI 2022年第8期3849-3862,共14页
Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent ... Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system. 展开更多
关键词 mobile agent security capturing integrity attacks
下载PDF
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
6
作者 Alese Boniface Kayode Alowolodu Olufunso Dayo Adekunle Adewale Uthman 《Communications and Network》 2021年第2期68-78,共11页
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention ... With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews. 展开更多
关键词 mobile agent Distribution Model Data Leakage Detection Data Leakage Prevention DLP SECURITY Distributed Computing
下载PDF
General Study of Mobile Agent Based Intrusion Detection System (IDS)
7
作者 Chandrakant Jain Aumreesh Kumar Saxena 《Journal of Computer and Communications》 2016年第4期93-98,共6页
The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The eviden... The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues. 展开更多
关键词 Intrusion Detection System mobile agent INTRUSION Network ATTACK Security
下载PDF
Anonymous Authentication for Secure Mobile Agent Based Internet Business
8
作者 Sivaraman Audithan Thanjavur Swaminathan Murunya Pandi Vijayakumar 《Circuits and Systems》 2016年第8期1421-1429,共9页
Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based appl... Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. This kind of security has been provided by several previously proposed algorithms based on RSA digital signature cryptography. However, the computational time for performing encryption and decryption operations in the past literatures is very high. In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. Comparing with previous anonymous authentication schemes, our proposed scheme provides more security and it is effective in terms of computation cost. The experimental results show that the proposed method authenticates the users with low computational time significantly. 展开更多
关键词 mobile agents AUTHENTICATION Elliptic Curve Digital Signature Computational Time Servers
下载PDF
Cooperative fault detection and recovery in the GNSS positioning of mobile agent swarms based on relative distance measurements
9
作者 Qifeng CHEN Yunhe MENG +1 位作者 Song LI Yuxin LIAO 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第5期129-144,共16页
Relative measurements are exploited to cooperatively detect and recover faults in the positioning of Mobile Agent(MA)Swarms(MASs).First,a network vertex fault detection method based on edge testing is proposed.For eac... Relative measurements are exploited to cooperatively detect and recover faults in the positioning of Mobile Agent(MA)Swarms(MASs).First,a network vertex fault detection method based on edge testing is proposed.For each edge,a property that has a functional relationship with the properties of its two vertices is measured and tested.Based on the edge testing results of the network,the maximum likelihood principle is used to identify the vertex fault sources.Second,an edge distance testing method based on the noncentral chi-square distribution is developed for detecting faults in the Global Navigation Satellite System(GNSS)positioning of MASs.Third,a recovery strategy for faults in the positioning of MASs based on distance measurement is provided.The effectiveness of the proposed methods is validated by a simulation case in which an MAS passes through a GNSS spoofing zone.The proposed methods are conducive to increasing the robustness of the positioning of MASs in complex environments.The main novelties include the following:(A)network vertex fault detection is based on concrete probability analysis rather than simple majority voting,and(B)the relation of detectability and recoverability of MAS positioning faults with the structure of the relative measurement network is first disclosed. 展开更多
关键词 Fault detection and recovery Global Navigation Satellite System mobile agents Network topology POSITIONING
原文传递
A Communication Security Protocol of Mobile Agent System
10
作者 GUAN Huanmei ZHANG Huanguo +1 位作者 MENG Xuejun ZHANG Jingwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第2期117-120,共4页
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu... The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent. 展开更多
关键词 mobile agent communication security multifactor authentication encryption transmission
原文传递
Blinking adaptation for synchronizing a mobile agent network
11
作者 Huan SHI Hua-ping DAI You-xian SUN 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第8期658-666,共9页
We investigate the issue of synchronizing a blinking coupling mobile agent network through a blinking adaptation strategy,where each agent with blinking wave emission behavior not only adjusts its blinking period acco... We investigate the issue of synchronizing a blinking coupling mobile agent network through a blinking adaptation strategy,where each agent with blinking wave emission behavior not only adjusts its blinking period according to the local property of its neighbors,but also coordinates its blinking phase with those of neighboring agents.In leading the agents to blink orderly with a blinking period commensurate with the characteristic time of the dynamical oscillator,the presented blinking adaptation strategy works effectively in guaranteeing the synchronous motion of the considered network when the power density is large.In addition,the influence of the controlling parameter and moving velocity on network evolution is studied by assessing the convergence time. 展开更多
关键词 mobile agents Blinking adaptation Coupled-oscillator networks SYNCHRONIZATION
原文传递
A semantic web services discovery approach based on a mobile agent using metadata
12
作者 Nadia Ben Seghir Okba Kazar +1 位作者 Khaled Rezeg Samir Bourekkache 《International Journal of Intelligent Computing and Cybernetics》 EI 2017年第1期12-29,共18页
Purpose-The success of web services involved the adoption of this technology by different service providers through the web,which increased the number of web services,as a result making their discovery a tedious task.... Purpose-The success of web services involved the adoption of this technology by different service providers through the web,which increased the number of web services,as a result making their discovery a tedious task.The UDDI standard has been proposed for web service publication and discovery.However,it lacks sufficient semantic description in the content of web services,which makes it difficult to find and compose suitable web services during the analysis,search,and matching processes.In addition,few works on semantic web services discovery take into account the user’s profile.The purpose of this paper is to optimize the web services discovery by reducing the search space and increasing the number of relevant services.Design/methodology/approach-The authors propose a new approach for the semantic web services discovery based on the mobile agent,user profile and metadata catalog.In the approach,each user can be described by a profile which is represented in two dimensions:personal dimension and preferences dimension.The description of web service is based on two levels:metadata catalog and WSDL.Findings-First,the semantic web services discovery reduces the number of relevant services through the application of matching algorithm“semantic match”.The result of this first matching restricts the search space at the level of UDDI registry,which allows the users to have good results for the“functional match”.Second,the use of mobile agents as a communication entity reduces the traffic on the network and the quantity of exchanged information.Finally,the integration of user profile in the service discovery process facilitates the expression of the user needs and makes intelligible the selected service.Originality/value-To the best knowledge of the authors,this is the first attempt at implementing the mobile agent technology with the semantic web service technology. 展开更多
关键词 METADATA Semantic web mobile agent ONTOLOGIE User profile Web service Paper type Technical paper
原文传递
Energy-efficient routing for mobile agents in wireless sensor networks
13
作者 CAO Yongtao HE Chen JIANG Lingge 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期161-166,共6页
In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed ... In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed to solve the problem.The order and number of nodes on the route traversed by a mobile agent determine the energy consumption,and hence,they have a significant impact on the overall performance of the whole system.Considering the limited transmission range of sensor nodes,we showed that this routing problem in a multi-hop cluster could be modeled as a node-weighted traveling tourist problem(TTP).We proved that the problem was nondeterministic polynomial time(NP)-complete.Then we presented a new approximation algorithm to solve the problem.Simulation experiments demonstrate that the proposed heuristic is more energy-efficient than the two earlier ones. 展开更多
关键词 wireless sensor networks mobile agent rout-ing NP-complete problem
原文传递
A secure model for mobile agent based on encrypted circuit construction
14
作者 ZHENG Yan WANG Ruchuan +1 位作者 MU Hong WANG Haiyan 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期176-181,共6页
As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted elemen... As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted element is presented in this paper.The trusted element,which differs from the traditional trusted hardware such as a smart card or a co-processor,offers a third party service based on an encrypted circuit construction.The procedure of constructing an encrypted circuit is introduced and the method of using the trusted service to protect the MA is also described.An application example is given to show how to use the new model at the end of the paper. 展开更多
关键词 mobile agent encrypted circuit construction SECURITY
原文传递
基于P2P的移动Agent入侵检测系统
15
作者 孙名松 李卿 刘鑫 《计算机技术与发展》 2009年第4期166-169,共4页
传统入侵检测系统的能力在迅猛发展的互联网面前日显薄弱。探讨了将P2P技术、Mobile-agent技术引入到传统入侵检测系统中,构建一个基于P2P的Mobile-agent入侵检测系统。组成该系统的Agent在网络的各个节点间流动,实时监测网络状况,同时A... 传统入侵检测系统的能力在迅猛发展的互联网面前日显薄弱。探讨了将P2P技术、Mobile-agent技术引入到传统入侵检测系统中,构建一个基于P2P的Mobile-agent入侵检测系统。组成该系统的Agent在网络的各个节点间流动,实时监测网络状况,同时Agent能够互相识别各自的行为并能根据潜在的策略采取适当的反应。该系统与传统系统相比具有灵活性、分布式、智能化等特点,能全面、深入地实现入侵的检测和防御。 展开更多
关键词 P2P mobileagent 入侵检测
下载PDF
Explosive synchronization in a mobile network in the presence of a positive feedback mechanism
16
作者 钱冬杰 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第1期187-191,共5页
Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive ... Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop. 展开更多
关键词 complex network explosive synchronization positive feedback mobile agent
下载PDF
基于Agent的信息技术外包方案评价体系结构 被引量:3
17
作者 席代昭 范体军 《情报杂志》 CSSCI 北大核心 2007年第9期92-93,97,共3页
企业信息技术外包方案评价涉及的因素非常复杂,特别是具有分散、开放性特点,这样造成外包方案评价因素的信息搜集具有相当大的难度。为此,基于Agent技术提出了信息技术外包方案评价体系结构,应用Mobil-Agent和Multi-Agent来实现各个模... 企业信息技术外包方案评价涉及的因素非常复杂,特别是具有分散、开放性特点,这样造成外包方案评价因素的信息搜集具有相当大的难度。为此,基于Agent技术提出了信息技术外包方案评价体系结构,应用Mobil-Agent和Multi-Agent来实现各个模块的功能,在实现决策评价体系智能化的同时,解决评价结果在速度、效率方面的难题和以前系统中存在的被动式搜索问题。 展开更多
关键词 信息技术外包 Mobil—agent MULTI—agent 信息源 搜索模块 分析模块
下载PDF
无线Mesh网络中基于人工免疫系统的异常检测(英文) 被引量:3
18
作者 易平 吴越 陈佳霖 《China Communications》 SCIE CSCD 2011年第3期107-117,共11页
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m... This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently. 展开更多
关键词 immune system intrusion detection mobile agent wireless mesh network network security
下载PDF
Extended knowledge attributed Petri Nets
19
作者 Attila Fur 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2014年第2期92-111,共20页
Choosing the best way for describing physical reality has always been standing in focus of research.Several methodologies have been developed based on classical mathematics,or statistics and also new disciplines-such ... Choosing the best way for describing physical reality has always been standing in focus of research.Several methodologies have been developed based on classical mathematics,or statistics and also new disciplines-such as soft-computing techniques-appeared.Petri Nets as one of the most naturalistic modeling methodologies are well suited to describe complex process in general.However in some fields of modeling the describing power of basic Petri Nets proved not to be robust enough,therefore several exten-sions were made to the original concept.Colored tokens(Colored Petri Nets),stochastic delayed streaming of mobile entities(Stochastic Petri Nets),object oriented architecture(Object Oriented Petri Nets),numerical(Numerical Petri Nets)and linguistic attributes(Fuzzy Petri Nets)broaden the range of capabilities.In some fields of problem solv-ing,usage of static and mobile knowledge bases is needed:e.g.,flexible manufacturing systems,or intelligent traffic simulation.These problems to be investigated involved new conceptual developments of Petri Nets and led to the introduction of Knowledge Attributed Petri Nets.At the same time distributed control in simulation appeared,intelligent agents supported the connection of mobile knowledge bases and static infer-ence engines in an effective way.The mentioned extensions brought general support in model synthesis,but some unsolved questions remained related to the implementation of intelligent mobile entities.This paper highlights a new level of AI controlled simulation introducing the Extended Knowledge Attributed Petri Nets that offer the capability of easy implementation of mobile inference engines and knowledge base,providing general mobile AI in Petri Nets. 展开更多
关键词 Know ledge attributed petri nets modeling of group behavior mobile agents
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部